The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled. and the attack and defense games were analyzed. Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were... https://www.lorenametaute.com/